DocumentCode :
3133921
Title :
Comparative Analysis of High Speed and Low Area Architectures of Blake SHA-3 Candidate on FPGA
Author :
Arsalan, Muhammad ; Aziz, Ahmedullah
Author_Institution :
Dept. of Electr. Eng., PNEC Nat. Univ. of Sci. & Technol. (NUST), Islamabad, Pakistan
fYear :
2012
fDate :
17-19 Dec. 2012
Firstpage :
248
Lastpage :
253
Abstract :
On Nov. 2, 2007, NIST announced a public competition to develop a new cryptographic hash algorithm SHA-3. After long run selection process, five finalists were selected for Round 3. Winner of this competition will be announced later in 2012. Blake is one of the candidates of round three of this competition. Along with the strength of security, efficient hardware implementation is also major evaluation criteria for final selection. Blake algorithm compression function is based on G-Function which executes 8 times in one round. In this paper, different architecture schemes named as 8G, 4G and 1G has been implemented on FPGA, based on serialization of Round Function processes. Optimization is performed by selecting appropriate numbers of LUTs and Slice Registers according to the Virtex 5 Device Architecture Resources. Implementation results of each design are compared with each other and with other design contributions. Full autonomous design for each scheme is implemented on Virtex 5 xc5vlx50t-3 FPGA. Common I/O and control interface is provided to find out the fair comparison results. For tradeoff analysis three design optimization techniques based on ´area´, ´speed´ and ´balance´ designs are used. We found 8G architecture provides the best through-put, 1G provides least area implementation and 4G provides the most efficient results in terms of throughput per area (TPA). 4G design gives Tpa of 2.1. Our design methodology and optimization strategy gives improved results from previous contributions.
Keywords :
cryptography; field programmable gate arrays; logic design; 1G architecture scheme; 4G architecture scheme; 8G architecture scheme; Blake SHA-3 algorithm; Blake algorithm compression function; FPGA; G-function; LUT; Virtex 5 device architecture resource; area design; balance design; comparative analysis; cryptographic hash algorithm; design methodology; design optimization; field programmable gate array; look-up table; round function process; secure hash algorithm; slice register; speed design; throughput per area; Algorithm design and analysis; Clocks; Computer architecture; Field programmable gate arrays; Hardware; Multiplexing; Registers; Blake; Encryption; Hash Functions; SHA-3;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Frontiers of Information Technology (FIT), 2012 10th International Conference on
Conference_Location :
Islamabad
Print_ISBN :
978-1-4673-4946-8
Type :
conf
DOI :
10.1109/FIT.2012.51
Filename :
6424330
Link To Document :
بازگشت